r00t-3xp10it / redpillView external linksLinks
Assist reverse tcp shells in post-exploration tasks
☆219Oct 17, 2025Updated 3 months ago
Alternatives and similar repositories for redpill
Users that are interested in redpill are comparing it to the libraries listed below
Sorting:
- C2 Powershell Command & Control Framework with BuiltIn Commands☆503Mar 11, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Apr 25, 2020Updated 5 years ago
- c++ fully undetected shellcode launcher ;)☆977Jun 11, 2021Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆761Jul 6, 2021Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Jan 24, 2026Updated 3 weeks ago
- Convert shellcode into different formats!☆358Jan 24, 2023Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,567Nov 9, 2021Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Aug 27, 2024Updated last year
- Python AV Evasion Tools☆519Oct 14, 2025Updated 4 months ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆386Apr 16, 2022Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Jul 6, 2024Updated last year
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆471Dec 13, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Jan 19, 2026Updated 3 weeks ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Open source C2 server created for stealth red team operations☆838Sep 26, 2022Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆342Jun 6, 2022Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆178Nov 25, 2022Updated 3 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- ☆334May 29, 2023Updated 2 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- Windows AV Evasion☆832Apr 13, 2020Updated 5 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Cobalt Strike kit for Persistence☆494Jan 27, 2020Updated 6 years ago